Microsoft.DiaSymReader.Native.amd64.dll

Description: Dia based SymReader

Authors: © Microsoft Corporation. All rights reserved.

Version: 14.29.30152.0

Architecture: 64-bit

Operating System: Windows

SHA256: 76d0da51c2ed6ce4de34f0f703af564c

File Size: 1.8 MB

Uploaded At: Dec. 3, 2025, 2:41 a.m.

Views: 7

Exported Functions

  • CreateNGenPdbWriter (Ordinal: 1, Address: 0x167c0)
  • CreateSymReader (Ordinal: 2, Address: 0x16930)
  • CreateSymWriter (Ordinal: 3, Address: 0x16590)
  • DllCanUnloadNow (Ordinal: 4, Address: 0x16780)
  • DllGetClassObject (Ordinal: 5, Address: 0x165c0)
  • DllGetClassObjectInternal (Ordinal: 6, Address: 0x165c0)
  • DllRegisterServer (Ordinal: 7, Address: 0x167b0)
  • DllUnregisterServer (Ordinal: 8, Address: 0x167b0)
  • VSDllRegisterServer (Ordinal: 9, Address: 0x167b0)
  • VSDllUnregisterServer (Ordinal: 10, Address: 0x167b0)

Imported DLLs & Functions

ADVAPI32.dll
  • RegCloseKey (Address: 0x18015a000)
  • RegOpenKeyExW (Address: 0x18015a008)
  • RegQueryValueExW (Address: 0x18015a010)
KERNEL32.dll
  • AcquireSRWLockExclusive (Address: 0x18015a340)
  • AcquireSRWLockShared (Address: 0x18015a348)
  • CloseHandle (Address: 0x18015a288)
  • CloseThreadpoolWork (Address: 0x18015a3a8)
  • CompareStringW (Address: 0x18015a1f8)
  • CreateFileMappingA (Address: 0x18015a320)
  • CreateFileMappingW (Address: 0x18015a2d0)
  • CreateFileW (Address: 0x18015a280)
  • CreateThreadpoolWork (Address: 0x18015a390)
  • DeleteCriticalSection (Address: 0x18015a070)
  • DeleteFileW (Address: 0x18015a300)
  • DeviceIoControl (Address: 0x18015a310)
  • DisableThreadLibraryCalls (Address: 0x18015a040)
  • EncodePointer (Address: 0x18015a110)
  • EnterCriticalSection (Address: 0x18015a068)
  • ExitProcess (Address: 0x18015a160)
  • ExpandEnvironmentStringsW (Address: 0x18015a350)
  • FindClose (Address: 0x18015a188)
  • FindFirstFileExW (Address: 0x18015a190)
  • FindNextFileW (Address: 0x18015a198)
  • FlushFileBuffers (Address: 0x18015a240)
  • FormatMessageW (Address: 0x18015a2a0)
  • FreeEnvironmentStringsW (Address: 0x18015a1e8)
  • FreeLibrary (Address: 0x18015a028)
  • GetACP (Address: 0x18015a1a8)
  • GetCommandLineA (Address: 0x18015a1c0)
  • GetCommandLineW (Address: 0x18015a1c8)
  • GetConsoleMode (Address: 0x18015a258)
  • GetConsoleOutputCP (Address: 0x18015a250)
  • GetCPInfo (Address: 0x18015a1b8)
  • GetCurrentDirectoryW (Address: 0x18015a380)
  • GetCurrentProcess (Address: 0x18015a0e8)
  • GetCurrentProcessId (Address: 0x18015a088)
  • GetCurrentThreadId (Address: 0x18015a050)
  • GetDriveTypeW (Address: 0x18015a378)
  • GetEnvironmentStringsW (Address: 0x18015a1e0)
  • GetEnvironmentVariableW (Address: 0x18015a2a8)
  • GetFileAttributesW (Address: 0x18015a2e0)
  • GetFileSize (Address: 0x18015a2c8)
  • GetFileSizeEx (Address: 0x18015a260)
  • GetFileType (Address: 0x18015a218)
  • GetFullPathNameW (Address: 0x18015a358)
  • GetLastError (Address: 0x18015a020)
  • GetModuleFileNameW (Address: 0x18015a170)
  • GetModuleHandleExW (Address: 0x18015a168)
  • GetModuleHandleW (Address: 0x18015a0e0)
  • GetNativeSystemInfo (Address: 0x18015a038)
  • GetOEMCP (Address: 0x18015a1b0)
  • GetProcAddress (Address: 0x18015a148)
  • GetProcessHeap (Address: 0x18015a208)
  • GetStartupInfoW (Address: 0x18015a0d0)
  • GetStdHandle (Address: 0x18015a210)
  • GetStringTypeW (Address: 0x18015a220)
  • GetSystemInfo (Address: 0x18015a2b8)
  • GetSystemTimeAsFileTime (Address: 0x18015a090)
  • GetTickCount (Address: 0x18015a2b0)
  • HeapAlloc (Address: 0x18015a178)
  • HeapFree (Address: 0x18015a180)
  • HeapReAlloc (Address: 0x18015a230)
  • HeapSize (Address: 0x18015a228)
  • InitializeCriticalSection (Address: 0x18015a078)
  • InitializeCriticalSectionAndSpinCount (Address: 0x18015a120)
  • InitializeCriticalSectionEx (Address: 0x18015a030)
  • InitializeSListHead (Address: 0x18015a098)
  • InitializeSRWLock (Address: 0x18015a328)
  • InterlockedFlushSList (Address: 0x18015a100)
  • IsDebuggerPresent (Address: 0x18015a0b8)
  • IsProcessorFeaturePresent (Address: 0x18015a0d8)
  • IsValidCodePage (Address: 0x18015a1a0)
  • LCMapStringW (Address: 0x18015a200)
  • LeaveCriticalSection (Address: 0x18015a060)
  • LoadLibraryExA (Address: 0x18015a370)
  • LoadLibraryExW (Address: 0x18015a150)
  • LocalAlloc (Address: 0x18015a048)
  • LocalFree (Address: 0x18015a298)
  • MapViewOfFile (Address: 0x18015a2d8)
  • MapViewOfFileEx (Address: 0x18015a318)
  • MultiByteToWideChar (Address: 0x18015a1d0)
  • QueryPerformanceCounter (Address: 0x18015a080)
  • RaiseException (Address: 0x18015a118)
  • ReadConsoleW (Address: 0x18015a278)
  • ReadFile (Address: 0x18015a270)
  • ReleaseSRWLockExclusive (Address: 0x18015a330)
  • ReleaseSRWLockShared (Address: 0x18015a338)
  • RtlCaptureContext (Address: 0x18015a0a0)
  • RtlLookupFunctionEntry (Address: 0x18015a0a8)
  • RtlPcToFileHeader (Address: 0x18015a158)
  • RtlUnwindEx (Address: 0x18015a0f8)
  • RtlVirtualUnwind (Address: 0x18015a0b0)
  • SetEndOfFile (Address: 0x18015a308)
  • SetEnvironmentVariableW (Address: 0x18015a1f0)
  • SetFileAttributesW (Address: 0x18015a2e8)
  • SetFilePointerEx (Address: 0x18015a268)
  • SetLastError (Address: 0x18015a108)
  • SetStdHandle (Address: 0x18015a238)
  • SetUnhandledExceptionFilter (Address: 0x18015a0c8)
  • Sleep (Address: 0x18015a058)
  • SubmitThreadpoolWork (Address: 0x18015a398)
  • TerminateProcess (Address: 0x18015a0f0)
  • TlsAlloc (Address: 0x18015a128)
  • TlsFree (Address: 0x18015a140)
  • TlsGetValue (Address: 0x18015a130)
  • TlsSetValue (Address: 0x18015a138)
  • TryEnterCriticalSection (Address: 0x18015a388)
  • UnhandledExceptionFilter (Address: 0x18015a0c0)
  • UnmapViewOfFile (Address: 0x18015a2c0)
  • VirtualAlloc (Address: 0x18015a2f0)
  • VirtualFree (Address: 0x18015a2f8)
  • VirtualProtect (Address: 0x18015a360)
  • VirtualQuery (Address: 0x18015a368)
  • WaitForThreadpoolWorkCallbacks (Address: 0x18015a3a0)
  • WideCharToMultiByte (Address: 0x18015a1d8)
  • WriteConsoleW (Address: 0x18015a290)
  • WriteFile (Address: 0x18015a248)
ole32.dll
  • CoTaskMemAlloc (Address: 0x18015a3b8)
  • CoTaskMemFree (Address: 0x18015a3c0)